* encryption keys are not specifically got from the expert secret word, to avert savage power watchword breaking utilizing splitting equipment (e.g. realistic card groups), when the telephone was lost or stolen

* one and only Android consent is fundamental for the application: access to SD card for reinforcement/restore (no web access required and no advertisements!)

* reinforcement capacity for all put away passwords and other private information in view of ZIP AES 256 encryption (reinforcement can be perused on your PC with typical UNZIP programming)

* reinforcement can be SEND specifically to a protected stockpiling through bluetooth, email or distributed storage

* the reinforcement document is overwritten on the erasure, so that it can’t be restored by recuperation devices